31
www.ernw.de Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [[email protected]] at ACM SigComm2015 Workshop on Ethics in Networked Systems Research

Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [[email protected]] at ACM SigComm2015 Workshop on Ethics in Networked

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Reflections on Vulnerability DisclosureCase Studies & Ethical Dilemmas

by Enno Rey [[email protected]]

at ACM SigComm2015Workshop on Ethics in Networked Systems Research

Page 2: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Who Am I ¬ Researcher in the field of network devices and protocols.

¬ Founder (2001) and head of a (40+ employee) company providing security assessment & vulnerability research services.

¬ Regularly involved in vulnerability disclosure procedures

And increasingly facing ethical dilemmas in the course of those.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #2

Page 3: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Relevant Discussions ¬ Google’s Project Zero:http://googleprojectzero.blogspot.de/2015/02/feedback-and-data-driven-updates-to.html

¬ CERT/CC Approach:http://www.cert.org/vulnerability-analysis/vul-disclosure.cfm

¬ WEIS Paper [2006]: http://weis2006.econinfosec.org/docs/17.pdf

¬ Statement by Bruce Schneier [2007]: https://www.schneier.com/essays/archives/2007/01/schneier_full_disclo.html

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #3

Page 4: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Why We Do Security Research ¬ Develop our capabilities/skills and our

methodology when tackling certain tasks.

¬ Contribute to public security knowledge & discussion. Helps to increase the visibility of our expertise.

¬ Simply because security research is fun ;-)

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #4

Page 5: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Who’s Paying The Bill?

¬ US: Research we “just do on our own” without a specific customer context because we think it’s important to look at the security

properties of some class of devices or because we’re curious as for the real-life implementation of protocols etc.

¬ US/THEM: Research that is somewhat related to/sponsored by a customer security assessment project with an agreement along the lines of: “while you [customer] pay n man-days for the assessment, we’re willing to spend much more effort for a certain

component, if you’re ok with us sharing the results with the public

thereafter”.

¬ THEM: Research projects we’re engaged for in a dedicated manner. The main property being that the engaging party fully owns

the intellectual property from the project.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #5

Page 6: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Vulnerability Disclosure ¬ Full Disclosure Tell everybody.

¬ Responsible Disclosure Tell vendor (of a product).

¬ Other Tell broker. Tell some 3rd party, usually for $$. Don't tell anybody. Etc.

Variants, from perspective of "audience" in the early stages of process.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #6

Page 7: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Rain Forest Puppy Policy / RFPolicy

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #7

Page 8: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Slightly Modified Terminology

¬ “finder”: individual or organization that identifies a potential vulnerability in a product or online service

¬ “vendor”: individual or organization that developed the product or service or is responsible for maintaining it.

¬ “remediation”: patch, fix, upgrade, configuration, or documentation change to either remove or mitigate a vulnerability.

Along the lines of: ISO/IEC 29147:2014 Information technology — Security techniques — Vulnerability disclosure

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #8

Page 9: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Simplest Case¬ The finder who has discovered a

vulnerability which she now reports

¬ to the vendor who receives the information,

¬ in order to provide remediation, which in turn benefits all users using the product/software in question.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #9

Page 10: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Outcome¬ Contribute to the education of the

parties involved/affected and thereby help to achieve an overall higher state of security for everybody.

¬ Let’s designate this objective as:[OBJ_L_PUBLIC_CULTURE]

L = long-term

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #10

Page 11: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Further Assumptions ¬ At the time of reporting no patch is available.

¬ The vendor actually takes care of remediation.

¬ It can be deployed everywhere where needed, without too much delay.

¬ The people involved/users affected are well-informed, willing to deploy the remediation and capable/enabled to do so.

Let’s call themstakeholders.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #11

Page 12: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Implications of Our Policy ¬ We always got into direct contact with the

vendors.

¬ We never went through through brokering organizations.

¬ We never asked for or received any financial compensation.

¬ We have never sold any vulnerability information to a 3rd party.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #12

Page 13: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

The exception proves the rule.

#nootherchoice #epicvendorfail

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #13

Page 14: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Legal Blur

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #14

Page 15: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

It becomes increasingly difficult, mainly for these reasons…

¬ A growing number of vendors out there operates with outspoken or elusive legal threats in the course of the procedure.

¬ The Wassenaar Arrangement (WA).

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #15

Page 16: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Implications of WassenaarArrangement ¬ Might have severe implications with regard

to the way vulnerability disclosure takes place “across borders”.

¬ Is PoC code covered by the 2nd controlled class of software as of the agreement?

¬ Further discussion: Sergey Bratus:

http://www.cs.dartmouth.edu/~sergey/drafts/wassenaar-public-comment.pdf

“Regs — Discussions on Wassenaar” mailing list established by Arrigo Triulzi

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #16

Page 17: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

New Stakeholders in Town

Vulnerability Disclosure

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #17

Page 18: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Main Differences ¬ There’s another group of stakeholders involved which are not part of the previous, “traditional” picture, but who are heavily affected when driving their car, when being treated by means of

network-connected medical devices, when using some piece of technology in their household or even using pieces of technology to protect this very sphere etc.

¬ The vulnerabilities might have a direct impact on their health or on their personal property as opposed to the somewhat anonymous assets of enterprise

organizations or vendors depicted in the classic RFPolicy.

¬ At the same time the affected users might be completely unaware of the vulnerabilities.

¬ Even if they knew, due to the specific nature of certain components/devices it might just not be technically possible or feasible to apply the remediation.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #18

Page 19: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

A Recent Example

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #19

Page 20: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

More Case Studieshttps://www.insinuator.net/2014/03/how-to-own-a-router-fritzbox-avm-vulnerability-analysis/

https://www.insinuator.net/2015/05/analysis-of-an-alarm-system-part-23/

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #20

Page 21: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Another Main Objective¬ These aspects induce another main objective

(of vulnerability handling), to be designated as follows:

[OBJ_S_PUBLIC_PREV_HARM]

Scope: Protect public from harm against their lives, health or economic situation in the short-term.

S = short-term

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #21

Page 22: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

The Key Question Identifying this objective evidently brings up an interesting question:

¬ How to proceed once the now two main objectives (of vulnerability [non-] disclosure), that are [OBJ_L_PUBLIC_CULTURE] and [OBJ_S_PUBLIC_PREV_HARM], clash?

¬ Or, to put it less abstract: what if pursuing the long-term goal of (vendor/community) education conflicts with the short-term goal of not contributing to people getting harmed?

¬ That's the (type of) question(s) I'd like to discuss today ;-)

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #22

Page 23: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Looking at the Above Example ¬ Are we supposed (or even morally obliged) to

disclose vulnerabilities in a medical device (maybe, after having tried to get in contact with the vendor several times and on several channels, without luck)?

¬ This might put patients at danger (and the devices possibly can’t be patched anyway, for regulatory reasons).

¬ On the other hand: whom does it help if we just sit on the information?

¬ Should we try to go through other channels? If so, which ones? etc.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #23

Page 24: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Ethics Committee @ ERNW ¬ We established an ethics committee about

two years ago not least in order to resolve this type of

dilemmas.

¬ It can be consulted by every member and it is entitled to provide a recommendation

considered binding for everybody, including management.

¬ Still we keep thinking there might be better/more suitable ways of vulnerability handling (and there’s probably several other researchers facing the same type of questions).

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #24

Page 25: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Alternatives [I] These include:

¬ don’t do anything with vulnerabilities we discover and “just sit on them”, maybe for a certain period of time imposed by some

governing rules we have to come up with, maybe “indefinitely”.

¬ go full disclosure.

¬ go through a broker (which saves energy & time, too) furthermore this could bring in money to be used for

additional Troopers student invitations, the Troopers charity fund or just some more nice equipment for the lab.

I’m sure the guys would come up with plenty of ideas….

What could alternatives look like?

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #25

Page 26: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Alternatives [II] ¬ only report to vendor once there’s a bug bounty program (alternatively “drop 0day” as our old buddy Michael

Ossmann suggested).

¬ perform full disclosure and combine it with going through media/the press (again this could save energy & time and it might even

increase the reach, hence subsequently contribute to the objective of “public education).

¬ hand over everything to something like a “national clearing house”.

¬ something else…

What could alternatives look like?

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #26

Page 27: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Preliminary Conclusion ¬ For the moment we don’t find any of those

particularly consistent with the overall objectives.

¬ Still we sense we have to develop an adapted approach to vulnerability disclosure, for the reasons outlined above.

¬ It’s just: what could that new approach look like?

¬ We’re happy to receive any type of feedback. If nothing else we’re happy to contribute to the ongoing (and, from some perspective, overdue) debate of vulnerability disclosure and ethics of our field.

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #27

Page 28: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

There’s never enough time…

THANK YOU… ...for yours!

Slides:https://www.insinuator.net

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #28

Page 29: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

Questions?

¬ You can reach us at: [email protected], www.ernw.de

¬ Our blog: www.insinuator.net

¬ Follow me at: @Enno_Insinuator

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #29

Page 30: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

REGISTRATION almost OPEN: www.troopers.de

There are few things to know about TROOPERS:

March,14 -18. 2016Heidelberg, GermanyMake the world a safer place.

DATE: PLACE:

MISSION:

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #30

Page 31: Reflections - ernw.de€¦ · Reflections on Vulnerability Disclosure Case Studies & Ethical Dilemmas by Enno Rey [erey@ernw.de] at ACM SigComm2015 Workshop on Ethics in Networked

www.ernw.de

The Archive¬ Feel the spirit – TROOPERS15 Trailer:

https://www.youtube.com/watch?v=A9zWD7ZVAGI

¬ TROOPERS15 Talks: Videos:

https://www.youtube.com/playlist?list=PL1eoQr97VfJkfckz9nZFR7tZoBkjij23f

Slides: https://www.troopers.de/archives/

¬ We hope to see you in 2016!

Jeff Gough at TROOPERS13

Blog: Conference:

08/21/15 ACM SigComm2015 - Workshop on Ethics in Networked Systems Research #31